post

Results 251 - 275 of 462Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Aug 06, 2019
Old-guard database providers are expensive, proprietary, have high lock-in costs, and impose restrictive licensing terms. The challenge to date has been to achieve the same performance and availability of commercial-grade databases on open source databases such as MySQL, PostgreSQL, and MariaDB. Examine key considerations that go into any database migration decision and specific use cases—in Financial Services and Healthcare Analytics implementations—where Datavail carefully managed database migrations from traditional database providers to the cloud—and in particular Amazon Aurora. Download the eBook to learn about: Migration considerations and strategies including lift and shift, re-platforming, and re-factoring Security and compliance functionality enabled by Amazon Aurora Performance and scalability opportunities enabled by AWS
Tags : 
    
AWS
Published By: FICO     Published Date: Feb 06, 2018
The FICO® Enterprise Security Score measures the likelihood that you will suffer a data breach in the coming 12 months. To deliver the FICO Enterprise Security Score, we access billions of external data points at internet scale and apply our analytics to give you an empirically derived score. You can measure the cybersecurity risk of your organization, or any organization you want to work with, to see the risk you are inheriting from your supply chain. We provide the information behind your cybersecurity score so you can see where you need to take action, and you can measure the effect of improvements on your overall cybersecurity posture.
Tags : 
grow, optimize, business, enterprise, security, data, breach
    
FICO
Published By: FICO     Published Date: Apr 07, 2018
Cybersecurity is on everyone’s mind – but why should you care about the cybersecurity of the businesses you work with? Download our infographic and discover: When you need to assess the cyber risk of another organization. The implications of not understanding the cybersecurity posture of the businesses you work with.. How measuring third-party cybersecurity risk will help you.
Tags : 
    
FICO
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: Infosys     Published Date: May 21, 2018
There are several reasons for this, including the inability of healthcare institutions to constantly monitor post-operative deterioration as well as patient's inability to visit the healthcare center for post-operation followups. Most of the patient data is recorded manually. This data is often weaned from displays of multiple monitoring devices like vitals monitor, infusion pumps, and ventilators. More often than not, these devices do not talk to each other or to a central system. Doctors, nurses, or other care-givers manually note down patient statistics in their files and notepads. Even though the healthcare industry is in the throes of digitization, there's still a lot of paper doing the rounds. eventually, the data from these physical sheets might be fed into an electronic system, but there is a high chance of error in that process.
Tags : 
digital, connected, care, patient, healthcare
    
Infosys
Published By: Infosys     Published Date: Feb 11, 2019
Examining trends identified by 5,000 shoppers that provide guideposts for setting a strategic course for growth.
Tags : 
    
Infosys
Published By: Apstra     Published Date: Aug 19, 2019
You may have read in the news about horrific security gaps that have the potential of bringing down whole infrastructures, leaking critical business and personal data, and exposing organizations to massive liability. There is no question that improving organizations’ security posture is a critical requirement for infrastructure and security teams.
Tags : 
    
Apstra
Published By: Cisco     Published Date: Apr 03, 2014
The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.
Tags : 
cisco, security, firewall, global threat, trends, applications, cloud
    
Cisco
Published By: F5 Networks Inc     Published Date: Feb 18, 2015
SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between your organization and the bad actors. Read this whitepaper to learn how your organization can properly embrace a higher security posture to protect SSL.
Tags : 
ssl, cryptographic protocols, data security, higher security posture, security, it management, data management
    
F5 Networks Inc
Published By: Dell SecureWorks     Published Date: Apr 09, 2011
Read this whitepaper to learn how Dell SecureWorks' multi-phase Penetration testing can help you obtain a true understanding of your security and risk posture so that you can strengthen your defenses and prevent a successful attack.
Tags : 
intrusion prevention, dell, secureworks, attacks, network security, cyber risk, cyberrisk, penetration
    
Dell SecureWorks
Published By: RES Software     Published Date: Apr 08, 2013
RES Software, éditeur leader de solutions de poste de travail dynamique, annonce le déploiement de sa solution de gestion des environnements de travail au sein de la compagnie aérienne Europe Airpost. Europe Airpost, est l’une des principals compagnie aérienne française. Elle est membre du groupe international de services aériens ASL Aviation.
Tags : 
    
RES Software
Published By: RES Software     Published Date: Apr 08, 2013
Ce livre blanc a pour objectif de décrire les principes de base de la gestion des espaces de travail utilisateur et son rôle stratégique dans les projets de virtualisation de postes de travail. Bon nombre de professionnels de l’informatique et d’analystes s’accordent aujourd’hui à dire que l’avenir des environnements informatiques d’entreprise est aux configurations hybrides alliant postes de travail traditionnels, clients légers, terminaux distants et postes de travail virtuels, une évolution qui complique considérablement le contrôle des données utilisateur par les administrateurs informatiques et appelle à imaginer de nouvelles méthodes de gestion des espaces de travail utilisateur.
Tags : 
    
RES Software
Published By: RES Software     Published Date: Apr 08, 2013
Afin de répondre aux demandes de nouvelles fonctionnalités, d’économies et d’amélioration de la qualité (d’intégrité et de performance, par exemple), les infrastructures des postes de travail sont en constante évolution. Aujourd’hui, de tels changements ont une incidence quasi systématique sur les conditions d’utilisation des postes. Ce livre blanc décrit les concepts de transformation des postes et comment la technologie de transformation des postes de travail peut aider les entreprises à réussir leur transition vers des espaces de travail utilisateur administrés sans préjudice pour la productivité de l’utilisateur.
Tags : 
    
RES Software
Published By: RES Software     Published Date: Apr 08, 2013
RES Software, éditeur leader de solutions de poste de travail dynamique, annonce le déploiement de sa solution de gestion des environnements de travail au sein du Groupe Chèque Déjeuner. Le Groupe Chèque Déjeuner est une entreprise sociale créée en 1964, considéré comme le numéro 3 mondial sur le marché des titres spéciaux de paiement à vocation sociale et culturelle. Fort d’une présence à l’international dans 13 pays, regroupant plus de 2130 collaborateurs, en 2011, le Groupe Chèque Déjeuner a realise un volume d’affaires de 4,3 milliards d’euros et un chiffre d’affaires de 290,3 millions.
Tags : 
    
RES Software
Published By: Webroot UK     Published Date: Sep 25, 2013
Have you seen a lot of articles and blog posts with titles like “Is Antivirus Dead?” If so, there is a good reason: Traditional signature-based antivirus technology is rapidly heading toward obsolescence.
Tags : 
reinventing the virus, antivirus, webroot security, client cloud, architecture, rollback, technology, antivirus technology
    
Webroot UK
Published By: Marketo     Published Date: Mar 22, 2018
Advertising on social media platforms has changed tremendously. Recent updates to many social networks' algorithms give users a better experience—one with less promotional content and more relevant content that they want to see. This means that, as a marketer, you need to supplement your organic posts with paid promotion to get your posts seen by your audience. Download this eBook to learn more!
Tags : 
    
Marketo
Published By: Marketo     Published Date: Feb 11, 2019
your brand What content you need to support your social media marketing How often to post on social media (and how to create an editorial calendar) How to measure the effectivene
Tags : 
    
Marketo
Published By: DataMotion     Published Date: Oct 02, 2008
This white paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and discusses the steps that an organization should take to mitigate the risks it faces from employee use of communication tools. Also included in this document are brief descriptions of the companies that have co-sponsored it.
Tags : 
certifiedmail, borderware, postini, symantec, workshare, data management, data protection, database security
    
DataMotion
Published By: Asure Software     Published Date: Jun 21, 2012
A school district in Missouri sought to optimize the booking and scheduling of its newly modernized conference and meeting spaces. Its old scheduling software was frustrating, as it was difficult to customize and configure. But after installing Meeting Room Manager, the schools are able to set specific room and equipment configurations, and post activities online as well as on a public viewing screen. Learn more.
Tags : 
asure software, human resources, technology, hr management, productivity, employee
    
Asure Software
Published By: Asure Software     Published Date: Jun 21, 2012
A school district in Missouri sought to optimize the booking and scheduling of its newly modernized conference and meeting spaces. Its old scheduling software was frustrating, as it was difficult to customize and configure. But after installing Meeting Room Manager, the schools are able to set specific room and equipment configurations, and post activities online as well as on a public viewing screen. Learn more.
Tags : 
asure software, human resources, technology, hr management, productivity, employee
    
Asure Software
Published By: Payscale, Inc     Published Date: Apr 04, 2018
What someone is paid has an enormous impact on his or her life, and can carry all kinds of implicit meanings. It can be the difference between Angela in marketing having the funds to allow her kids to join a second sport, and having to tell them not this year. It can be John the product manager having the vacation days to finally take that international trip, or having to postpone it for another day. It can mean Ashton feeling valued by her employer, or feeling like she should look elsewhere.
Tags : 
    
Payscale, Inc
Published By: Marketo     Published Date: Dec 12, 2016
Download The Definitive Guide to Social Media Marketing to learn: - How to create a social media marketing strategy - How to choose what social media platforms are right for your brand - What content you need to support your social media marketing - How often to post on social media (and how to create an editorial calendar) - How to measure the effectiveness of your social media campaigns - What team and tools you need to support your social media strategy
Tags : 
marketo, marketing, social media, social media marketing
    
Marketo
Published By: Red Hat     Published Date: Mar 16, 2015
With Red Hat® Satellite, you can instantly see the status of your systems and if any are missing important patches or configuration changes.Not only does Red Hat Satellite improve security, it lets you easily measure and report on the patch level of systems in your company. Your security posture is improved through: • A single, centralized management tool. • Secure connection policies for remote administration. • Standardized machine configurations. • Digitally signed content.
Tags : 
centralized management took, security posture, configurations, remote administration, it management
    
Red Hat
Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
The way attackers are going after corporate data and infrastructure these days means that it’s not a matter of if, but when you’ll be forced to buy a ticket for the post-breach rollercoaster. But a little preparation and planning can go a long way toward making the ride as manageable and inexpensive as possible. This eBook walks you through how to get started on planning and executing an incident response for your business.
Tags : 
data breach, cyber-attack, cloud, post-breach, breach, hosting, response plan, security
    
INetU Managed Hosting
Published By: AWS     Published Date: May 09, 2018
More and more businesses are embracing workplace mobility and bring-your-own-device (BYOD) strategies as a method to reduce costs and stimulate productivity. These initiatives give employees, contractors, and business partners the power to remotely contribute, collaborate, and communicate with team members from familiar devices, anywhere around the world. To implement these strategies effectively however, IT teams must provide access to applications, business systems, collaboration platforms, and development environments without sacrificing end-user experiences, hindering their organization’s security posture, or inducing excessive costs. What many are finding is that traditional methods of desktop and application delivery and on-premises Virtualized Desktop Infrastructure (VDI) often cannot live up to this task, as they introduce new challenges upon implementation.
Tags : 
    
AWS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.